Sciweavers

2884 search results - page 349 / 577
» Evaluating learning algorithms and classifiers
Sort
View
ISI
2007
Springer
13 years 10 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CVPR
2012
IEEE
12 years 23 days ago
Top-down visual saliency via joint CRF and dictionary learning
Top-down visual saliency facilities object localization by providing a discriminative representation of target objects and a probability map for reducing the search space. In this...
Jimei Yang, Ming-Hsuan Yang
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
14 years 5 months ago
A Game Theoretical Model for Adversarial Learning
Abstract—It is now widely accepted that in many situations where classifiers are deployed, adversaries deliberately manipulate data in order to reduce the classifier’s accura...
Wei Liu, Sanjay Chawla
ICAC
2008
IEEE
14 years 4 months ago
Guided Problem Diagnosis through Active Learning
There is widespread interest today in developing tools that can diagnose the cause of a system failure accurately and efficiently based on monitoring data collected from the syst...
Songyun Duan, Shivnath Babu
EMMCVPR
2005
Springer
14 years 3 months ago
Learning Hierarchical Shape Models from Examples
Abstract. We present an algorithm for automatically constructing a decompositional shape model from examples. Unlike current approaches to structural model acquisition, in which on...
Alex Levinshtein, Cristian Sminchisescu, Sven J. D...